Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 02:43
Static task
static1
Behavioral task
behavioral1
Sample
9b5cb573cd40fa740cab21151f7c1e01be39fb8f3496a5c03cee0aa4589a65dd.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9b5cb573cd40fa740cab21151f7c1e01be39fb8f3496a5c03cee0aa4589a65dd.exe
Resource
win10v2004-20240709-en
General
-
Target
9b5cb573cd40fa740cab21151f7c1e01be39fb8f3496a5c03cee0aa4589a65dd.exe
-
Size
73KB
-
MD5
1e29ffe79461e84f5b3f0dc27224ed77
-
SHA1
4944d28da243a0db85eb08803a8c37068b18e9f4
-
SHA256
9b5cb573cd40fa740cab21151f7c1e01be39fb8f3496a5c03cee0aa4589a65dd
-
SHA512
c0da458d69d992268eec0b1305c6ed6728e140576b7420eca37cf9dd2f94c3d0701d36f0d8c3feef7e06defbd6264a3795c374def5251caff136c3605d6759b0
-
SSDEEP
1536:hbB1UYK5QPqfhVWbdsmA+RjPFLC+e5hY0ZGUGf2g:hl1ZNPqfcxA+HFshYOg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2216 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 1668 cmd.exe 1668 cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1288 wrote to memory of 1668 1288 9b5cb573cd40fa740cab21151f7c1e01be39fb8f3496a5c03cee0aa4589a65dd.exe 29 PID 1288 wrote to memory of 1668 1288 9b5cb573cd40fa740cab21151f7c1e01be39fb8f3496a5c03cee0aa4589a65dd.exe 29 PID 1288 wrote to memory of 1668 1288 9b5cb573cd40fa740cab21151f7c1e01be39fb8f3496a5c03cee0aa4589a65dd.exe 29 PID 1288 wrote to memory of 1668 1288 9b5cb573cd40fa740cab21151f7c1e01be39fb8f3496a5c03cee0aa4589a65dd.exe 29 PID 1668 wrote to memory of 2216 1668 cmd.exe 30 PID 1668 wrote to memory of 2216 1668 cmd.exe 30 PID 1668 wrote to memory of 2216 1668 cmd.exe 30 PID 1668 wrote to memory of 2216 1668 cmd.exe 30 PID 2216 wrote to memory of 2144 2216 [email protected] 31 PID 2216 wrote to memory of 2144 2216 [email protected] 31 PID 2216 wrote to memory of 2144 2216 [email protected] 31 PID 2216 wrote to memory of 2144 2216 [email protected] 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b5cb573cd40fa740cab21151f7c1e01be39fb8f3496a5c03cee0aa4589a65dd.exe"C:\Users\Admin\AppData\Local\Temp\9b5cb573cd40fa740cab21151f7c1e01be39fb8f3496a5c03cee0aa4589a65dd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:2216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 00.exe4⤵PID:2144
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\[email protected]
Filesize73KB
MD51c1934a765c8bb0dea1246895df69e84
SHA1657e1d492049169091db67a6522261e0b29948d5
SHA256c2c3cf41482f2656f69caef2dc013c05727a5444fb2c0a98ab859802fe8730ff
SHA51250d826c3a2ed3b8cc1aad985d5f8b79f520ce1dc72b6665572d496744f4c06d5273f15935546c69ac30f0893d3e6df8296fecbf8a244f9b885388b2969a3901a